Exploring IoT: Enabling Technologies, Protocols, and Applications - A Comprehensive Survey
VerifiedAdded on  2023/04/25
|5
|1799
|282
AI Summary
In this article we will discuss about Internet of things and below are the summaries point:-
The paper titled "Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications" explores the concept of IoT technology and its applications, particularly in the smart home domain.
The authors highlight the transformative impact of IoT on communication, converting physical devices into smart devices through embedded systems, sensor devices, and telecommunication technologies.
The paper discusses the architecture of IoT, including various layers such as object layer, object abstraction layer, service management layer, application layer, and business layer, and emphasizes the growing market opportunities and the rapid increase in connected machines in recent years.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Internet of Things: A
Survey on Enabling
Technologies, Protocols,
and Applications
Survey on Enabling
Technologies, Protocols,
and Applications
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
INTERNET OF THING
1
Summary of the paper
Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
This article was written by Ala Al-fuqaha, mohammed Aledhari, and Moussa Ayyash in the
year 2015 [1].This journal article provides the fundamental concept of the internet of thing
technology with the application issues. Researcher evaluated the internet of thing is an
advanced technology that can be used to connect numbers of physical objects and devices
with each other. The smart home is one of the best applications of the IoT technology where
this technique is used to control and monitor the AC, fan, lights and other devices with the
help of remote process. The aim of this research paper is to highlight the phenomena of the
internet of thing technology with their network architecture and describe the elements of the
internet of thing technology. The author observed that the traditional revolution in the
internet, machine to machine and communication technologies can be seen as the initial stage
of the internet of thing technique.
It is observed that such kind of technology changed the way of communication and it
converted the physical devices into the smart device with the help of the embedded system,
pervasive computing, sensor devices, and telecommunication technologies. According to the
researcher the internet of thing is expected to have an important home and business
applicationsto contribute to the quality of life and to increase the world economy. It is rightly
true because IoT technology has the ability to improve the performance of the system and
consumers can control their computer devices from any location [1].There are numbers of
papers produced by the many researchers that cover the aspects of the internet of thing but
they did not provide the in depth analysis. This journal paper provided the complete
information about the internet of thing with their elements and architecture by which readers
can expand their skills and knowledge. It is suggested that in the year 2020 the internet of
thing smart objectives will reach around 212 billion entities which rightly indicates that the
use of IoT technology is growing rapidly because it offers a better market opportunity for the
internet service provider, and application developers. It is evaluated that the numbers of
connected machines have increased by 300% in the last five years due to the use of internet
of thing. Researcher highlighted that the traffic monitoring and controlling of the cellular
network in the United State also rightly indicated an increase of 250% for the machine to
machine traffic volume in the year 2011. The internet of thing technology is also used in the
health care and manufacturing industries for growing the performance of the system. The
researcher analyzed that the internet of thing has the ability of interconnecting billons of
objects with the help of internet connectivity and it is very flexible rather than other
networks. There are numbers of layers involves in the architecture of IoT which are discussed
in this journal paper, for example, objects layer, an object abstraction layer, service
management layer, application layer, and business layer.
The internet of thing is competent by existing development in smart sensors, RFID, internet
protocol and communication technologies. The key premise is to create the smart sensors to
collaborating directly rather than involving individual for offering a new division of
application. In addition, IoT is predicted to link diverse technologies for enabling new
applications by linking physical object together with the help of intelligent decision making.
IoT application can range from transportation, industrial automation, smart homes, healthcare
as well as emergency reactions regarding manmade as well as natural disasters in which
human decision making are complex. This article demonstrates that IoT can create the
devices for connecting the internet smart by practicing pervasive computing, ubiquitous,
sensor network, communication technology, embedded devices, sensor network, as well as
internet protocols as well as applications. There are certain devises that should be developed
for the Internet of thing to attain goal such as architecture standardization as well as new
devices with protocols.
1
Summary of the paper
Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
This article was written by Ala Al-fuqaha, mohammed Aledhari, and Moussa Ayyash in the
year 2015 [1].This journal article provides the fundamental concept of the internet of thing
technology with the application issues. Researcher evaluated the internet of thing is an
advanced technology that can be used to connect numbers of physical objects and devices
with each other. The smart home is one of the best applications of the IoT technology where
this technique is used to control and monitor the AC, fan, lights and other devices with the
help of remote process. The aim of this research paper is to highlight the phenomena of the
internet of thing technology with their network architecture and describe the elements of the
internet of thing technology. The author observed that the traditional revolution in the
internet, machine to machine and communication technologies can be seen as the initial stage
of the internet of thing technique.
It is observed that such kind of technology changed the way of communication and it
converted the physical devices into the smart device with the help of the embedded system,
pervasive computing, sensor devices, and telecommunication technologies. According to the
researcher the internet of thing is expected to have an important home and business
applicationsto contribute to the quality of life and to increase the world economy. It is rightly
true because IoT technology has the ability to improve the performance of the system and
consumers can control their computer devices from any location [1].There are numbers of
papers produced by the many researchers that cover the aspects of the internet of thing but
they did not provide the in depth analysis. This journal paper provided the complete
information about the internet of thing with their elements and architecture by which readers
can expand their skills and knowledge. It is suggested that in the year 2020 the internet of
thing smart objectives will reach around 212 billion entities which rightly indicates that the
use of IoT technology is growing rapidly because it offers a better market opportunity for the
internet service provider, and application developers. It is evaluated that the numbers of
connected machines have increased by 300% in the last five years due to the use of internet
of thing. Researcher highlighted that the traffic monitoring and controlling of the cellular
network in the United State also rightly indicated an increase of 250% for the machine to
machine traffic volume in the year 2011. The internet of thing technology is also used in the
health care and manufacturing industries for growing the performance of the system. The
researcher analyzed that the internet of thing has the ability of interconnecting billons of
objects with the help of internet connectivity and it is very flexible rather than other
networks. There are numbers of layers involves in the architecture of IoT which are discussed
in this journal paper, for example, objects layer, an object abstraction layer, service
management layer, application layer, and business layer.
The internet of thing is competent by existing development in smart sensors, RFID, internet
protocol and communication technologies. The key premise is to create the smart sensors to
collaborating directly rather than involving individual for offering a new division of
application. In addition, IoT is predicted to link diverse technologies for enabling new
applications by linking physical object together with the help of intelligent decision making.
IoT application can range from transportation, industrial automation, smart homes, healthcare
as well as emergency reactions regarding manmade as well as natural disasters in which
human decision making are complex. This article demonstrates that IoT can create the
devices for connecting the internet smart by practicing pervasive computing, ubiquitous,
sensor network, communication technology, embedded devices, sensor network, as well as
internet protocols as well as applications. There are certain devises that should be developed
for the Internet of thing to attain goal such as architecture standardization as well as new
devices with protocols.
INTERNET OF THING
2
Internet of thing is higher chances for the equipment manufacturers, developers of application
and ISPs. There are trillion and billion of the dollar is projected with the intention of growth
in IoT based services. This article evaluated that healthcare is projected for becoming the
largest part of a business related to IoT. It can be summarised that unique opportunity for
appliances as well as traditional equipment could be transformed their product into smart
things. It is also addressed that ISPs are necessary for offering the QoS for mixed P2M,
M2M, and P2P traffic. There are several standards as well as protocols are proposed for
offering and shorten programmers of the application as well as the job of service providers.
There are different standards required for supporting the IoT such as ETSI, IEEE, IETF, and
W3C.
IoT could not be secured through traditional security protocols that could be exercised on the
internet. In addition to this, security problems can be considered in different layers related to
IoT with the application of infrastructure level. In addition to this, Codo is a solution of
security for storage of data that caches information for bulk decryption as well as encryption.
This article states that the IEEE 802.15.4 security protocol secures the interaction amid
different neighboring systems. It is also addressed that IPSec is an obligatory security
protocol in the context of the IPv6 network layer. Along with this, Transport Layer Security
in the context of TCP, as well as Datagram TLS in the context of UDP, could be
implemented into transport layers. In addition to this, application layers could be either relied
on lower layers of security as well as apply some solution such as SASL, OASIS, Lithe,
QUIP, and EventGaurd to offer authentication with encryption. In addition to this, the
intrusion detection system in the context of the internet of things is investigated in this article.
Along with this, Fog computing could be used into support of IoT. This article also illustrates
that Fog computing could perform as a bridge amid large scale cloud computing, smart
devices as well as storage services.
2
Internet of thing is higher chances for the equipment manufacturers, developers of application
and ISPs. There are trillion and billion of the dollar is projected with the intention of growth
in IoT based services. This article evaluated that healthcare is projected for becoming the
largest part of a business related to IoT. It can be summarised that unique opportunity for
appliances as well as traditional equipment could be transformed their product into smart
things. It is also addressed that ISPs are necessary for offering the QoS for mixed P2M,
M2M, and P2P traffic. There are several standards as well as protocols are proposed for
offering and shorten programmers of the application as well as the job of service providers.
There are different standards required for supporting the IoT such as ETSI, IEEE, IETF, and
W3C.
IoT could not be secured through traditional security protocols that could be exercised on the
internet. In addition to this, security problems can be considered in different layers related to
IoT with the application of infrastructure level. In addition to this, Codo is a solution of
security for storage of data that caches information for bulk decryption as well as encryption.
This article states that the IEEE 802.15.4 security protocol secures the interaction amid
different neighboring systems. It is also addressed that IPSec is an obligatory security
protocol in the context of the IPv6 network layer. Along with this, Transport Layer Security
in the context of TCP, as well as Datagram TLS in the context of UDP, could be
implemented into transport layers. In addition to this, application layers could be either relied
on lower layers of security as well as apply some solution such as SASL, OASIS, Lithe,
QUIP, and EventGaurd to offer authentication with encryption. In addition to this, the
intrusion detection system in the context of the internet of things is investigated in this article.
Along with this, Fog computing could be used into support of IoT. This article also illustrates
that Fog computing could perform as a bridge amid large scale cloud computing, smart
devices as well as storage services.
INTERNET OF THING
3
Problems addressed by author
It is observed that the heterogeneity of the internet of thing elements requires a thorough
solution to produce ubiquitous IoT services which are a very common problem addressed by
the author with the help of an architectural model. This model alleviates interoperability
problems that caused through the diversity of the networks and protocols used in the IoT
technology. From this paper, it has resulted that the text based process in the XMPP through
XML imposes a large network overhead which is also addressed by the researcher. The
researchersuggested people can adopt the EXI process to address the issue of network
overhead. Investigator also addressed the few other problems like under specification,
incompatibility of modes in storing and non-storing modes.
Why is this problem important?
It is very important to address all above problems and issues because they affect the
performance and efficiency of the IoT networks and XML process produce the high network
overhead by which people can consumers can suffer from the configuration related issues.
Approaches adopted by author
There are numbers of approaches are adopted in the journal paper such as feasible approach,
an approach for access control, IoT big data approach, and an approach based on the software
defined networking is also adopted. In the feasible approach the mobility of the system is
controlled and managed with the help of a leader based process and access control approach
is used to support the application layer on a per vendor basis. In the software defined
networking researcher provided the IoT SDN approach to control and dynamic and
heterogonous multi-network environments.
Key results
The results of the XMPP over HTML5 show that XMPP is a more efficient process for web
application and it requires real time communication. From this paper, it is founded that under
the huge volume of information exchange AMQP process provided the better outcomes as
compared to the REST-ful web services. It is observed that when the MTC device on the
internet of thing remains inactive for a longer time instead of being active, the throughput of
the MTC systems will be increased due to less contention in the server.
Paper findings
From the investigation, it is founded that the IEEE 802.11ah achieves better throughput as
compared to the IEEE 802.15.4 in both non-idle and idle channels. It also results that the
expected numbers of queries for tag identification with the help of the CDMA process are
lower as compared to the EPC protocol. This paper is completely based on the internet of
thing and their key element where the researcher provided the relevant information and
collected the data from journal articles, online websites, and books.
Bad in the approaches used
The main problem of this paper is that the author did not provide complete information about
the internet of things like advantages, drawbacks, limitation and security risks. The researcher
did not provide any approach to reduce the risks and issues associated with the internet of
thing technology.
Some improvement and recommendation
In which the researcher used the qualitative data analysis approach that provided only
theoretical information but in future, they should involve quantitative data analysis approach
in order to improve the effectiveness of the paper. It is suggested that research should provide
in depth analysis about security threats and risks of IoT technology and involve the content
analysis to gain the better conclusion of their investigation.
3
Problems addressed by author
It is observed that the heterogeneity of the internet of thing elements requires a thorough
solution to produce ubiquitous IoT services which are a very common problem addressed by
the author with the help of an architectural model. This model alleviates interoperability
problems that caused through the diversity of the networks and protocols used in the IoT
technology. From this paper, it has resulted that the text based process in the XMPP through
XML imposes a large network overhead which is also addressed by the researcher. The
researchersuggested people can adopt the EXI process to address the issue of network
overhead. Investigator also addressed the few other problems like under specification,
incompatibility of modes in storing and non-storing modes.
Why is this problem important?
It is very important to address all above problems and issues because they affect the
performance and efficiency of the IoT networks and XML process produce the high network
overhead by which people can consumers can suffer from the configuration related issues.
Approaches adopted by author
There are numbers of approaches are adopted in the journal paper such as feasible approach,
an approach for access control, IoT big data approach, and an approach based on the software
defined networking is also adopted. In the feasible approach the mobility of the system is
controlled and managed with the help of a leader based process and access control approach
is used to support the application layer on a per vendor basis. In the software defined
networking researcher provided the IoT SDN approach to control and dynamic and
heterogonous multi-network environments.
Key results
The results of the XMPP over HTML5 show that XMPP is a more efficient process for web
application and it requires real time communication. From this paper, it is founded that under
the huge volume of information exchange AMQP process provided the better outcomes as
compared to the REST-ful web services. It is observed that when the MTC device on the
internet of thing remains inactive for a longer time instead of being active, the throughput of
the MTC systems will be increased due to less contention in the server.
Paper findings
From the investigation, it is founded that the IEEE 802.11ah achieves better throughput as
compared to the IEEE 802.15.4 in both non-idle and idle channels. It also results that the
expected numbers of queries for tag identification with the help of the CDMA process are
lower as compared to the EPC protocol. This paper is completely based on the internet of
thing and their key element where the researcher provided the relevant information and
collected the data from journal articles, online websites, and books.
Bad in the approaches used
The main problem of this paper is that the author did not provide complete information about
the internet of things like advantages, drawbacks, limitation and security risks. The researcher
did not provide any approach to reduce the risks and issues associated with the internet of
thing technology.
Some improvement and recommendation
In which the researcher used the qualitative data analysis approach that provided only
theoretical information but in future, they should involve quantitative data analysis approach
in order to improve the effectiveness of the paper. It is suggested that research should provide
in depth analysis about security threats and risks of IoT technology and involve the content
analysis to gain the better conclusion of their investigation.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
INTERNET OF THING
4
References
[1].A., Al-Fuqaha, M., Guizani, M., Mohammadi, M. Aledhari and M., Ayyash, “Internet
of things: A survey on enabling technologies, protocols, and applications’, IEEE
Communications Surveys & Tutorials, vol. 17, no. 4, 2015, pp.2347-2376.
4
References
[1].A., Al-Fuqaha, M., Guizani, M., Mohammadi, M. Aledhari and M., Ayyash, “Internet
of things: A survey on enabling technologies, protocols, and applications’, IEEE
Communications Surveys & Tutorials, vol. 17, no. 4, 2015, pp.2347-2376.
1 out of 5
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.